Analysis
-
max time kernel
122s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 19:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4c3b93ec72e05d4128b2e2daae18153a.dll
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4c3b93ec72e05d4128b2e2daae18153a.dll
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
4c3b93ec72e05d4128b2e2daae18153a.dll
-
Size
312KB
-
MD5
4c3b93ec72e05d4128b2e2daae18153a
-
SHA1
11f649235e7fabb38d7883a933b0bb9a89090db8
-
SHA256
22ce8f459a3cbc7f748a0b019d35b9ece62bd07bfc2f2d55737a1353b0136d46
-
SHA512
327916715bd20eddb399e61a09276a25cda669f41679ca2ccd45fada8178a5d8d77e3213df40018bc06351d939532f9acfdcb583512703f046b9c1f40851ea93
-
SSDEEP
3072:7pWe5vAIq4cKeCI6KTzDjTKApHbhALu5bP9KOybjF+Vt4vlxkMgTwKKCWI8UFtmx:7pKI26s77hHVI323TuCoCen
Score
1/10
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 rundll32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2224 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2224 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2224 1696 rundll32.exe 14 PID 1696 wrote to memory of 2224 1696 rundll32.exe 14 PID 1696 wrote to memory of 2224 1696 rundll32.exe 14 PID 1696 wrote to memory of 2224 1696 rundll32.exe 14 PID 1696 wrote to memory of 2224 1696 rundll32.exe 14 PID 1696 wrote to memory of 2224 1696 rundll32.exe 14 PID 1696 wrote to memory of 2224 1696 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c3b93ec72e05d4128b2e2daae18153a.dll,#11⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2224
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c3b93ec72e05d4128b2e2daae18153a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1696